WAF

Are Application Testing Tools Still Relevant with Self Learning WAFs?

We all want to secure our applications. This task is becoming harder by the day as our applications constantly change multiple times per week,...

Access to Applications Based on a « Driving License » Model

More and more countries are modifying their policies with a new “driving license” model. With a classic license model, drivers can be caught frequently; they...

WAFs Should Do A Lot More Against Current Threats Than Covering OWASP Top 10

Looking in the rearview mirror The application threat landscape has rapidly evolved. For years, users consumed applications over the internet using the common tool -...

Building Tier 1 IP Transit – What’s Involved and Why Do It?

Not all internet connectivity is created equal. Many Tier 2 and Tier 3 ISPs, cloud service providers and data integrators consume IP Transit sourced...

Orchestrating Flows for Cyber

There is a great scene in the movie Victor, Victoria, where the character played by James Garner decides it’s time to mix things up...

Marrying the Business Need With Technology, Part 3: Re-aggregating the Tools

In part one of this blog series we discussed how there is oftentimes a lack of knowledge when it comes to infrastructure technology and...

Application Delivery and Application Security Should be Combined

Most businesses have multi-function printers that can fax, scan, and copy.  In our roles, we are multi-functional as well.  A network architect is often...

Taking Stock of Application-Layer Security Threats

The financial services industry is, by its very nature, inherently risk adverse. The sheer volume of transactional data moving through networks can be staggering...

Retail & Web Application Security: What Application-Layer Security Threats Are in Store for Retailers

The retail industry is undergoing a transformative period as the “empowered” consumer, driven by technological advances and breakthroughs, impacts how retailers market, communicate and...

Are Your Medical Records Safe? NO.

Radware’s Web Application Security Report finds security flaws in the healthcare industry What do healthcare institutions, insurance companies, hospitals, pharmaceuticals and manufacturers of medical equipment...

Healthcare & Web Application Security: A Prescriptive Look at Application-Layer Security Risks

The healthcare sector consists of a wide number of segments: payers, such as insurance companies; providers such as hospitals and doctors; and manufacturers, both...

Web Application Security in a Digitally Connected World

Apps control our lives today. We pay our bills, do our shopping, communicate with our doctors, buy our groceries, order a taxi, and even...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

The Evolution of Application Development

Delivering and securing containers and microservices is relatively new. Though there may be a few hiccups, all will normalize to a strong, steady state.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.

Agile Security Is Now A Reality

Businesses are looking to optimize and accelerate their SDLC, in order to improve their operational efficiency and gain a competitive edge.

Nation-State Attacks: Motivations & Consequences

Organizations leave sensitive, monetizable data unprotected, making cyberattacks a high-stakes, low-risk venture for nation-states.